Manage Your SharePoint Online Environment with PnP PowerShell
In this article, we explain how to get started using PnP PowerShell, and review some practical examples of where the module can immediately add value for tenant administrators.
In this article, we explain how to get started using PnP PowerShell, and review some practical examples of where the module can immediately add value for tenant administrators.
Microsoft is giving Purview eDiscovery a make-over to introduce a modernized UI and to simplify the solution into standard and premium variants. Content searches are going away, but the same functionality is available as a standard case. It's time to prepare the folks who work on compliance and run eDiscovery investigations for the changes coming at the end of 2024/2025.
Oversharing of information is a major concern in the AI era. This article describes how to write a script to report file sharing for OneDrive for Business accounts. The report details the files shared, the type of sharing link and access, and who can access the files. It's an example of using the Microsoft Graph PowerShell SDK to understand what's happening in a tenant.
This week on Practical Protection, we are talking about Password Policies, what NIST thinks, and offer some advice on staying secure.
The room mailbox statistics script has proven to be a popular script downloaded and used by many to analyze the usage patterns of room mailboxes. Recently, a reader pointed out that the Graph API request to fetch workspaces didn't work. Microsoft has changed the Places resource and the request now needed to run against the beta endpoint. All of which brought me to rewrite the script using the Graph SDK.
This episode of Practical Purview showcases some compliance controls that you should consider including in any provisioning solution. This is not an exhaustive list, but rather some key controls to consider.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
In this episode of the Practical 365 Podcast, we are joined by TEC Speaker, Shinesa Cambric, to explore the parallels between AI adoption and the cloud revolution, get into the changing nature of identity in our digital world, and get a sneak peak into Shinesa's Keynote session.
In the first episode of Practical Teams Phone, Thorsten Pickhan reviews Teams Shared Calling, how it works, and some practical use cases.
Microsoft's big launch of Copilot Wave 2 featured many new capabilities, like a super-duper focused Inbox for Outlook (one that works this time), Python in Excel, and a profusion of agents for SharePoint Online. The idea behind agents is pretty good and should be valuable, even if IT might have some dark thoughts about how agents might allow people to access information that they shouldn't (this won't happen).
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.